Security attacks taxonomy on bring your own devices (BYOD) model
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wireilla
2014
|
Subjects: | |
Online Access: | http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf http://eprints.usm.my/47317/ https://wireilla.com/ijmnct/vol4.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Sains Malaysia |
Language: | English |
id |
my.usm.eprints.47317 |
---|---|
record_format |
eprints |
spelling |
my.usm.eprints.47317 http://eprints.usm.my/47317/ Security attacks taxonomy on bring your own devices (BYOD) model Singh, Manmeet Mahinderjit Soh, Sin Siang Oh, Ying San Malim, Nurul Hashimah Ahamed Hassain Shariff, Azizul Rahman Mohd QA75.5-76.95 Electronic computers. Computer science Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the potential attacks of BYOD and taxonomy of BYOD attacks are presented. Advanced persistent threat (APT) and malware attack are discussed in depth in this paper. Next, the proposed solution to mitigate the attacks of BYOD is discussed. Lastly, the evaluations of the proposed solutions based on the X. 800 security architecture are presented. Wireilla 2014-10 Article PeerReviewed application/pdf en http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf Singh, Manmeet Mahinderjit and Soh, Sin Siang and Oh, Ying San and Malim, Nurul Hashimah Ahamed Hassain and Shariff, Azizul Rahman Mohd (2014) Security attacks taxonomy on bring your own devices (BYOD) model. International Journal of Mobile Network Communications & Telematics ( IJMNCT), 4 (5). pp. 1-17. ISSN 1839-5678 https://wireilla.com/ijmnct/vol4.html |
institution |
Universiti Sains Malaysia |
building |
Hamzah Sendut Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Sains Malaysia |
content_source |
USM Institutional Repository |
url_provider |
http://eprints.usm.my/ |
language |
English |
topic |
QA75.5-76.95 Electronic computers. Computer science |
spellingShingle |
QA75.5-76.95 Electronic computers. Computer science Singh, Manmeet Mahinderjit Soh, Sin Siang Oh, Ying San Malim, Nurul Hashimah Ahamed Hassain Shariff, Azizul Rahman Mohd Security attacks taxonomy on bring your own devices (BYOD) model |
description |
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenues, reduced mobile costs and IT efficiencies. However, due to emerging attacks and limitations on device resources, it is difficult to trust these devices with access to critical proprietary information. Therefore, in this paper, the potential attacks of BYOD and taxonomy of BYOD attacks are presented. Advanced persistent threat (APT) and malware attack are discussed in depth in this paper. Next, the proposed solution to mitigate the attacks of BYOD is discussed. Lastly, the evaluations of the proposed solutions based on the X. 800 security architecture are presented. |
format |
Article |
author |
Singh, Manmeet Mahinderjit Soh, Sin Siang Oh, Ying San Malim, Nurul Hashimah Ahamed Hassain Shariff, Azizul Rahman Mohd |
author_facet |
Singh, Manmeet Mahinderjit Soh, Sin Siang Oh, Ying San Malim, Nurul Hashimah Ahamed Hassain Shariff, Azizul Rahman Mohd |
author_sort |
Singh, Manmeet Mahinderjit |
title |
Security attacks taxonomy on bring your own devices (BYOD) model |
title_short |
Security attacks taxonomy on bring your own devices (BYOD) model |
title_full |
Security attacks taxonomy on bring your own devices (BYOD) model |
title_fullStr |
Security attacks taxonomy on bring your own devices (BYOD) model |
title_full_unstemmed |
Security attacks taxonomy on bring your own devices (BYOD) model |
title_sort |
security attacks taxonomy on bring your own devices (byod) model |
publisher |
Wireilla |
publishDate |
2014 |
url |
http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf http://eprints.usm.my/47317/ https://wireilla.com/ijmnct/vol4.html |
_version_ |
1678593553677156352 |